Before you can begin administering system security, you must have a realistic assessment of the system’s current state of security. This chapter discusses the essential steps that you should follow in assessing a system’s security level.

This chapter is from the book

After reading this chapter and completing the exercises, you will be able to do the following:

Evaluate a system’s security.

Scan a system for vulnerabilities.

Evaluate the overall security of a network.

Use the “Six Ps” of security.

Apply a patch to your system.

Document your security.

Introduction

As you learn more about computer security, you will learn new techniques for securing a particular system. However, the ability to assess a system’s security is critical. Before you can begin administering system security, you must have a realistic assessment of the system’s current state of security. This chapter discusses the essential steps that you should follow in assessing a system’s security level. It is very important to assess a system’s security level prior to implementing any security measures. You must be cognizant of the current state of affairs in order to appropriately address vulnerabilities. You should also conduct periodic security audits to ensure that the appropriate level of security is being maintained.

It is also commonplace for security professionals and firms to be contracted to audit a system’s security. Whatever your purpose for assessing a system’s security, you will need to have some framework within which to conduct your review. This chapter gives you an understanding of how to approach such a review, and what to look for.